Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 18:27
Behavioral task
behavioral1
Sample
65b975417ee07e91458bf8b25bebbc24.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
65b975417ee07e91458bf8b25bebbc24.exe
Resource
win10v2004-20231215-en
General
-
Target
65b975417ee07e91458bf8b25bebbc24.exe
-
Size
2.9MB
-
MD5
65b975417ee07e91458bf8b25bebbc24
-
SHA1
4b273f15a7d81f86ab3b077b5c43f1467522c658
-
SHA256
9afe07e7f1b4e43a7c24a4a2d43d1089bf215ae94c42482126f2b191dabe7d85
-
SHA512
3fa87bd9d1096e09610e5ff3c4e148a815a82e5219a2910e57d89685a1dbebb804ead4c87c28560c31b68ea5407bdd9ee7936397478138c2bee3b058618b9b87
-
SSDEEP
49152:b5HjycCx5HSy1quMZu3N74NH5HUyNRcUsCVOzetdZJ:pjzCx5vvMZu34HBUCczzM3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2044 65b975417ee07e91458bf8b25bebbc24.exe -
Executes dropped EXE 1 IoCs
pid Process 2044 65b975417ee07e91458bf8b25bebbc24.exe -
resource yara_rule behavioral2/memory/2348-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/2044-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x00070000000231f4-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2348 65b975417ee07e91458bf8b25bebbc24.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2348 65b975417ee07e91458bf8b25bebbc24.exe 2044 65b975417ee07e91458bf8b25bebbc24.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2044 2348 65b975417ee07e91458bf8b25bebbc24.exe 85 PID 2348 wrote to memory of 2044 2348 65b975417ee07e91458bf8b25bebbc24.exe 85 PID 2348 wrote to memory of 2044 2348 65b975417ee07e91458bf8b25bebbc24.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\65b975417ee07e91458bf8b25bebbc24.exe"C:\Users\Admin\AppData\Local\Temp\65b975417ee07e91458bf8b25bebbc24.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\65b975417ee07e91458bf8b25bebbc24.exeC:\Users\Admin\AppData\Local\Temp\65b975417ee07e91458bf8b25bebbc24.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2044
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
421KB
MD591806c70dd4cebb6a9df8402a13c2c9e
SHA1518ca8105cc2bb0f66afcad815e52576a9d9bb6c
SHA256484200bf5804af44fe16c62666028b8895debeff55f583901ffdf20073238e08
SHA512db8332e062e5d70af1bc8bdfa26abb068234e42a5685a4aed12d649090a8b257498e72530c8e2966d1f5943205aa7748012ec8bf95df5c16326cef463ca6724e